Search by job, company or skills

U Mobile

Specialist, IT Security Analyst (Vulnerability Management)

new job description bg glownew job description bg glownew job description bg svg
  • Posted 3 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Life at U Mobile

We are Passionate, Innovative, Trustworthy, Team-Oriented & Fun-Loving.

At U Mobile, we are always on the lookout for great talents and passionate individuals to join our growing team.

Let's start your journey with an award-winning organization!

#UnbeatableCareerAwaits

Top Reasons To Join Us!

  • Awarded For
  • Most Preferred Employers in Telecommunication Industry (2022, 2023 & 2024)
  • Bronze Winner in Cross-Generational Workforce Engagement (2024)
  • Gold Winner for Excellence in Workplace Culture (2021)
  • Comprehensive medical, dental, optical and insurance benefits
  • Flexi working hours arrangements
  • Staff Line & Device Subsidy
  • Smart Casual Attire
  • Child Parental Care Leave
  • Convenient location with access to public transport (Imbi Monorail/Bukit Bintang MRT)
  • Special employee discounts for selected F&B Brands

Role

The Day-To-Day Activities

Vulnerability Management

  • Own the end-to-end vulnerability scanning cycle for infrastructure, endpoints, network devices, containers, and cloud workloads (scheduled and ad hoc).
  • Tune scanners, maintain asset groupings and credentialed scans, ensure coverage, and reduce false positives.
  • Triage and validate findings, assign severity based on CVSS, exploitability, business impact, and asset criticality.
  • Coordinate remediation with platform, network, and application teams; track SLAs and exceptions; escalate overdue items.
  • Manage patch verification and re-scan cycles; maintain a risk-accepted backlog with documented compensating controls.
  • Produce executive and operational reports (e.g., vulnerability backlog trend, Mean Time To Remediate, exposure by asset class).
  • Integrate vulnerability data into SIEM/SOAR/GRC for correlation and workflow automation where possible.

Security Compliance & Assurance

  • Plan and execute periodic compliance checks against internal security policies/standards and external frameworks (e.g., ISO/IEC 27001/2, NIST CSF, CIS Controls, PCI DSS, SOC 2, MAS/TRM/BNM-RMiT as applicable).
  • Perform control testing, evidence collection, sample-based reviews, and gap analysis; document findings and remediation plans.
  • Support internal/external audits and certification activities; coordinate with control owners for timely closure of audit observations.
  • Maintain policy-to-control-to-evidence mapping in GRC tools; ensure versioning and traceability.

IT Security Posture Management

  • Maintain and enhance security posture metrics (e.g., vulnerability exposure, hardening compliance, privileged access hygiene, endpoint protection coverage, configuration drift).
  • Oversee configuration baseline compliance (e.g., CIS benchmarks) for servers, endpoints, databases, cloud services, and network devices.
  • Contribute to secure configuration standards and review change requests for security impact.
  • Support risk assessments (systems, projects, vendors) and embed posture checks into onboarding and change processes.
  • Provide concise, actionable dashboards and briefings to leadership and technology stakeholders.

Collaboration & Governance

  • Support vulnerability remediation forums with Technology owners; drive issue resolution and risk decisions.
  • Work with AppSec, Cloud, IT Ops, and SOC/Threat Intelligence to prioritize remediation based on real-world threats and business context.
  • Develop SOPs, runbooks, and playbooks; deliver awareness and training to technical teams.

About You

Required Qualifications & Experience

  • Bachelor's degree in Computer Science, Information Security, Engineering, or equivalent experience.
  • 58 years in information security with strong experience in vulnerability management and security compliance.
  • Hands-on with enterprise vulnerability scanners (e.g., Tenable, Qualys, Rapid7), and experience with credentialed scanning.
  • Solid understanding of OS, network, cloud (AWS/Azure/GCP), and container security fundamentals.
  • Experience testing and evidencing controls against at least one framework (e.g., ISO 27001, NIST CSF, CIS, PCI DSS).
  • Familiarity with SIEM/SOAR, EDR, MDM, CMDB/asset management, patch management, and GRC platforms.

Preferred Certifications

  • Security: CISSP, CISM, Security+, CySA+
  • Vulnerability/Blue Team: GMON, GCIH, GCDA, eJPT/eCPPT
  • Cloud & Compliance: CCSP, Azure/AWS security certs, ISO 27001 Lead Implementer/Auditor, PCI ISA

Key Skills

  • Strong analytical and risk-based prioritization skills; able to translate technical findings into business impact.
  • Proficient in reporting and creating meaningful dashboards for both exec and technical audiences.
  • Excellent stakeholder management, facilitation, and escalation handling.
  • Scripting/automation (e.g., Python/PowerShell), API integrations for data extraction and workflow automation (bonus).
  • Clear, concise communication and documentation.

#LA-RA1

What's Next Once you have applied online, our team will review your application and due to a high volume of applications, only shortlisted candidates will be notified.

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 144078679